iOs EXPLOITS »

iHacktivation – iCloud on iPhone 4/4s/5/5c/5s Software

Download FREE iHacktivationiCloud on iPhone 4/4s/5/5c/5s Software

 

iHacktivation Description

 
Bellow i will show some of the communication request iPhone 5 side only:
 
albert.apple.com:443
http://captive.apple.com/jlkWKLNnn/onBGBJJKklljds/XOnkdffjksJHfdf.html
http://www.ibook.info/a6JKNDF/okDAFASF/dfFDFDGD/DSdfd/GHDSDddfd.html
http://www.thinkdifferent.us/fgdSAD/fsdfsdDSF5f6q/dsggDASDAFRbhg.html
setup.icloud.com:443
configuration.apple.com:443
-and now to filter the request we used ip.src == expresion
-this was easy, but study the packets captured we found some encryption:
Handshake Type: Client Key Exchange (16)
Change Cipher Spec Protocol: Change Cipher Spec
Encrypted Handshake Message
- we had to deal with TLSV1 protocol here and get the cipher, this was the hardest step in cloning the requests.For this we found a encryption teacher, and that girl helped us tremendously and free.Many thanks!When the cipher was decrypted we have cloned a part of apple server, but was a lot of request and communication protocols and we have to make a software to deal all of this, the result: iHactivation software was born !
 
New method was developed by iHacktivation Team, based on cloning some parts of the iCloud Apple authentication sequence requests.All requests were inserted in a small software iHactivation program, for easely use.To understand better this method look at the picture bellow to see how its work:
 
iHacktivation
Fig.1 Exploiting the iCloud requests
# Copyright (c) 1993-2006 Microsoft Corp.
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a ‘#’ symbol.
# For example:
#      102.54.94.97     rhino.acme.com          # source server
#       38.25.63.10     x.acme.com              # x client host
# localhost name resolution is handle within DNS itself.
#       127.0.0.1       localhost
 
#       ::1             localhost
iHacktivation
Fig. 2 iHacktivation Software in progress
 
What do you need to use this software?
- a notebook 1.6Ghz CPU, 10 Gb HDD, 2Gb RAM with wireless on board.
- XAMPP server installed
- OS Win 7 , XP.
- On apple device wireless is necessarily to work
What we provide to you?
- iHacktivation Software for 10 Apple device unlock
- Cloned files for Xampp server and Team Viewer support for install the files.
- Support for 10 activations.
iHacktivation
Fig 3. iCloud account successfully accessed on iPhone 5
Video

Download iHacktivationiCloud on iPhone 4/4s/5/5c/5s Software FREE

Primary Link

cheatsandhackbutttondownload

Mirror Link

cheatsandhackbutttondownload

 


Last application update:

Virus Scan:

 

  • Like!
    6

Comments:

2 Comments

  1. JTranquila May 24, 2014 at 10:22 pm - Reply

    Very good tool . I managed to bypass icloud on my iphone 5

  2. Ramon May 24, 2014 at 10:23 pm - Reply

    It is working ! I can’t believe this.. Thanks

Leave A Comment

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>